期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
“蝙蝠纹”艺术符号创作思维中的“造字法”运用 被引量:4
1
作者 张智艳 《艺术与设计(理论版)》 2009年第5X期255-257,共3页
从丑陋的蝙蝠原形到吉祥的蝙蝠纹样是一个极具中华文化特色的艺术符号生成过程。在此艺术符号的思考、表现与解读的过程中溶入了汉字造字法"形声"、"象形"、"指事"、"会意"、"假借"... 从丑陋的蝙蝠原形到吉祥的蝙蝠纹样是一个极具中华文化特色的艺术符号生成过程。在此艺术符号的思考、表现与解读的过程中溶入了汉字造字法"形声"、"象形"、"指事"、"会意"、"假借"的思想。这种艺术符号的创作思维对于现代艺术设计具有启示。 展开更多
关键词 “蝙蝠纹” 符号 创作思维 “造字法”
原文传递
NUMERICAL STUDY OF THE ABNORMAL TRACK OF TYPHOON MAGGIE
2
作者 张中锋 刘启汉 拓瑞芳 《Journal of Tropical Meteorology》 SCIE 2006年第2期174-178,共5页
Typhoon Maggie (1999) interacted with another tropical depression system and moved along a west-southwest track that is somewhat abnormal during its pre-landing stage. Two numerical experiments are carried out in th... Typhoon Maggie (1999) interacted with another tropical depression system and moved along a west-southwest track that is somewhat abnormal during its pre-landing stage. Two numerical experiments are carried out in this paper to study the effect of the interaction on the track of typhoon Maggie using the mcsoscale numerical weather prediction model system with a tropical cyclone bogusing scheme developed by Center for Coastal and Atmospheric Research, the Hong Kong University of Science and Technology. Results show that the cyclone system interacting with Maggie is the main factor for the abnormal track of Maggie. 展开更多
关键词 typhoon track bogus method
下载PDF
To Construct High Level Secure Communication System: CTMI Is Not Enough
3
作者 Sen Xu Xiangjun Lu +6 位作者 Aidong Chen Haifeng Zhang Haihua Gu Dawu Gu Kaiyu Zhang Zheng Guo Junrong Liu 《China Communications》 SCIE CSCD 2018年第11期122-137,共16页
Public key cryptographic (PKC) algorithms, such as the RSA, elliptic curve digital signature algorithm (ECDSA) etc., are widely used in the secure communication sys- tems, such as OpenSSL, and a variety of in- for... Public key cryptographic (PKC) algorithms, such as the RSA, elliptic curve digital signature algorithm (ECDSA) etc., are widely used in the secure communication sys- tems, such as OpenSSL, and a variety of in- formation security systems. If designer do not securely implement them, the secret key will be easily extracted by side-channel attacks (SCAs) or combinational SCA thus mitigat- ing the security of the entire communication system. Previous countermeasures of PKC im- plementations focused on the core part of the algorithms and ignored the modular inversion which is widely used in various PKC schemes. Many researchers believe that instead of straightforward implementation, constant time modular inversion (CTMI) is enough to resist the attack of simple power analysis combined with lattice analysis. However, we find that the CTMI security can be reduced to a hidden t-bit multiplier problem. Based on this feature, we firstly obtain Hamming weight of interme- diate data through side-channel leakage. Then, we propose a heuristic algorithm to solve the problem by revealing the secret (partial and full) base of CTMI. Comparing previous nec-essary input message for masking filtering, our procedure need not any information about the secret base of the inversion. To our knowl- edge, this is the first time for evaluating the practical security of CTM! and experimental results show the fact that CTMI is not enough for high-level secure communication systems. 展开更多
关键词 information security side channelanalysis elliptic curve digital signature algo-rithm constant time modular inversion ham-ming weight leakage
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部